Sciweavers

508 search results - page 59 / 102
» Poly-locality in quantum computing
Sort
View
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 9 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
ICS
2010
Tsinghua U.
14 years 6 months ago
On the Power of a Unique Quantum Witness
Rahul Jain, Iordanis Kerenidis, Greg Kuperberg, Mi...